...
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ENV02-C J | low | unlikely | medium | P2 | L3 |
Automated Detection
Tool | Version | Checker | Description | |
---|---|---|---|---|
Section | |
|
|
|
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
...
ENV02-CPP. Beware of multiple environment variables with the same effective name | |
Section 7.20.4, "Communication with the Environment" | |
"XYS Executing or Loading Untrusted Code" | |
...
...
CWE-807, "Reliance on Untrusted Inputs in a Security Decision" |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="0c578aea-7d1c-4acb-9466-6b3ce447c61c"><ac:plain-text-body><![CDATA[ | [[MSDN |
...
AA. |
...
Bibliography#MSDN] |
...
] |
...
[ |
...
|
...
http://msdn.microsoft.com/en-us/library/tehxacec(VS.71).aspx] | ]]></ac:plain-text-body></ac:structured-macro> |
...
void ENV05-J. Do not grant RuntimePermission with target createClassLoader 15. Runtime Environment (ENV) ENV07-J. Do not deploy an application that can be accessed using the Java Platform Debugger Architecture